heroui logo

Windows Credential Dumping LSASS Memory Createdump

Splunk Security Content

View Source
Summary
The detection rule identifies the usage of CreateDump.exe, a non-native Windows binary often introduced by third-party applications, particularly PowerShell 7, to produce memory dumps of processes. Leveraging Endpoint Detection and Response (EDR) data, the rule focuses on process behaviors, including the names and command-line executions of processes involved. It highlights the significance of this action as a potential indicator of attempts to extract sensitive information from LSASS memory, which can lead to credential theft and malicious lateral movement in a network. The detection mechanism is based on specific Sysmon and Windows Event Log data points, employing intricate filtering to isolate pertinent process execution data relevant to credential dumping activities.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1003.001
Created: 2024-12-10